基于时间反演的多用户下行安全传输技术
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:The secure transmission technology based on time reversal for multiuser downlink system
  • 作者:李方伟 ; 汪苹 ; 张海波
  • 英文作者:LI Fangwei;WANG Ping;ZHANG Haibo;School of Communication and Information Engineering, Chongqing University of Post and Telecommunication;
  • 关键词:信息泄露 ; 时间反演(TR) ; 波束赋形(BF) ; 安全容量 ; 空时聚焦
  • 英文关键词:information disclosure;;time reversal(TR);;beam forming(BF);;security capacity;;spatial and temporal focusing
  • 中文刊名:DBKX
  • 英文刊名:Chinese Journal of Radio Science
  • 机构:重庆邮电大学通信与信息工程学院;
  • 出版日期:2019-03-04 14:16
  • 出版单位:电波科学学报
  • 年:2019
  • 期:v.34
  • 基金:国家自然科学基金(61771084,61102062,61271260);; 重庆市科委自然科学基金(cstc2015jcyjA40050)
  • 语种:中文;
  • 页:DBKX201902003
  • 页数:7
  • CN:02
  • ISSN:41-1185/TN
  • 分类号:18-24
摘要
无线通信是开放的自由空间,窃听用户可能在通信过程中对信息进行窃取.针对多用户下行链路的信息泄露问题,提出一种基于时间反演(time reversal, TR)且采用波束赋形(beam forming, BF)技术优化的安全传输方案.该方案以最大化安全容量为多用户通信准则,建立多输入单输出(multiple-input single-output, MISO)窃听信道模型.一方面基站采用BF技术使信号在指定方向上增强,针对期望用户发送需求信号;另一方面由于TR技术对环境是自适应的,基站的信号在发射之前都要经过TR腔,其空时聚焦性使能量聚焦在合法接收方,保密性能更优.理论分析和仿真结果表明:与已有物理层安全方案相比,所提方案安全容量更高,误比特率更低.
        Information may be eavesdropped by eavesdropping users in the process of wireless communication which relies on open free space. To solve the information disclosure problem of multi-user downlink, a secure transmission scheme which is optimized by beam forming(BF) technology on the basis of time reversal(TR) technology is proposed in this paper. This scheme takes the maximization of security capacity as the principle of multiuser communication, builds a multiple input single output(MISO) wiretap channel model. On one hand, the base station uses beam forming technology to make the signals enhanced in the specified direction, and transmit the demand signals to the desired users. On the other hand, the signals of the base station need to pass through the time reversal cavities before being transmitted because of the environment adaptive technique-time reversal, and spatial and temporal focusing characteristics of time reversal technology make the energy focused on the legal receiver to make the performance of security better. The theoretical analysis and simulation results show that the proposed scheme has a higher security capacity and a lower bit error probability.
引文
[1] TRAN D D,HA D B,TRAN-HA V,et al.Secrecy Analysis with MRC/SC-based eavesdropper over heterogeneous channels[J].IETE journal of research,2015,61(4):36 3-371.
    [2] CSISZAR I,KORNER J.Broadcast channels with confidential messages[J].IEEE transactions on information theory,2003,24(3):339-348.
    [3] LIU T,SHAMAI S.A note on the secrecy capacity of the multiple-antenna wiretap channel[J].IEEE transactions on information theory,2009,55(6):2547-2553.
    [4] OGGIER F,HASSIBI B.The secrecy capacity of the MIMO wiretap channel[M].IEEE Press,2011.
    [5] SHAFIEE S,ULUKUS S.Achievable rates in Gaussian MISO channels with secrecy constraints[C]//IEEE International Symposium on Information Theory,2007:2466-2470.
    [6] 尹志伟.多点协作传输中协作波束赋形技术的研究[D].西安:西安科技大学,2012.YIN Z W.Research on coordinated beamforming technique in coordinated multipoint transmission system[D].Xi’an:Xidian University,2012.(in Chinese)
    [7] ALVES H,SOUZA R D,DEBBAH M,et al.Performance of transmit antenna selection physical layer security schemes[J].IEEE signal processing letters,2012,19(6):372-375.
    [8] JINGRAN L,QIANG L,JINTAI Y.Frequency diverse array beam forming for physical-layer security with directionally-aligned legitimate user and eavesdropper [C]//25th European Signal Processing Conference (EUSIPCO).IEEE,2017:2166-2170.
    [9] CHEN Y,WANG B,HAN Y,et al.Why time reversal for future 5G wireless?[J].IEEE signal processing magazine,2016,33(2):17-26.
    [10] 王秉中,臧锐,周洪澄.时间反演电磁波应用系统的研究进展[J].微波学报,2013,29(z1):22-28.WANG B Z,ZANG R,ZHOU H C.Progress in the application systems based on time-reversed electromagnetic waves[J].Journal of microwaves,2013,29(z1):22-28.(in Chinese)
    [11] FINK M.Time reversal of ultrasonic fields.I.Basic principles[J].IEEE transactions on ultrasonics ferroelectrics & frequency control,1992,39(5):555-66.
    [12] XU Q,CHEN Y,LIU K J R.Combating strong-weak spatial-temporal resonances in time-reversal uplinks[J].IEEE transactions on wireless communications,2016,15(1):568-580.
    [13] HAN F,YANG Y H,WANG B,et al.Time-reversal division multiple access over multi-path channels[J].IEEE transactions on communications,2012,60(7):1953-1965.
    [14] TAN V T,HA D B,TRAN D D.Evaluation of physical layer secrecy in MIMO ultra-wideband system using time-reversal techniques [C]//International Conference on Computing,Management and Telecommunications.IEEE,2014:70-74.
    [15] VITERI-MERA C A,TEIXEIRA F L.Equalized time reversal beamforming for frequency-selective indoor MISO channels[J].IEEE access,2017,PP(99):1-1.
    [16] SMITH D,HSU M,ACHOUR M,et al.Array-to-array beamforming and iterative time reversal techniques[J].2017.
    [17] HOSSIAN M D,SANAGAVARAPU A M.Eigenspace time reversal robust capon beamforming for target localization in continuous random media[J].IEEE antennas & wireless propagation letters,2017,PP(99):1-1.
    [18] CHEN Y,HAN F,YANG Y H,et al.Time-Reversal wireless paradigm for green internet of things:an overview[J].IEEE internet of things journal,2014,1(1):81-98.
    [19] YANG N,SURAWEERA H A,COLLINGS I B,et al.Physical layer security of TAS/MRC with antenna correlation[J].IEEE transactions on information forensics & security,2013,8(1):254-259.
    [20] RAHMANPOUR A,VAKILI V T,RAZAVIZADEH S M.Enhancement of physical layer security using destination artificial noise based on outage probability[J].Wireless personal communications,2017:1-13.DOI:10.1007/s11277-016-3865-9
    [21] BLOCH M,BARROS J,RODRIGUES M R D,et al.Wireless information-theoretic security[J].IEEE transactions on information theory,2008,54(6):2515-2534.
    [22] SIMON M,ALOUINI M.Digital Communication over Fading Channels[C]//Wiley-IEEE Press,2005:758-795.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700